CVE-2023-53774
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-09

Last updated on: 2025-12-09

Assigner: VulnCheck

Description
MiniDVBLinux 5.4 contains a remote code execution vulnerability in the SVDRP protocol that allows remote attackers to send commands to manipulate TV systems. Attackers can send crafted SVDRP commands through the svdrpsend.sh script to execute messages and potentially control the video disk recorder remotely.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-09
Last Modified
2025-12-09
Generated
2026-05-07
AI Q&A
2025-12-09
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
minidvblinux minidvblinux 5.4
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in MiniDVBLinux 5.4 involves the SVDRP protocol, where remote attackers can send specially crafted commands via the svdrpsend.sh script to manipulate TV systems. This allows attackers to execute commands remotely and potentially take control of the video disk recorder.


How can this vulnerability impact me? :

The vulnerability can allow remote attackers to execute arbitrary commands on the affected system without any authentication, potentially leading to unauthorized control over the video disk recorder and manipulation of TV system functions.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting to send crafted SVDRP commands to the MiniDVBLinux device using the svdrpsend.sh script. For example, you can use a curl command to send a test message to the TV screen to verify if the device is vulnerable: curl http://ip:8008/?site=commands&section=system&command=svdrpsend.sh%20MESG%20TEST_MESSAGE. If the message appears on the TV screen or the connection closes confirming the command was accepted, the system is vulnerable. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting network access to the SVDRP service (port 8008) to trusted hosts only, disabling or restricting the svdrpsend.sh script if possible, and monitoring for unauthorized SVDRP commands. Applying any available patches or updates from MiniDVBLinux is recommended once released. Until then, isolating the affected devices from untrusted networks can reduce the risk of exploitation. [1, 2, 3]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart